A survey of secure mobile ad hoc routing protocols

L Abusalah, A Khokhar… - … communications surveys & …, 2009 - ieeexplore.ieee.org
Several routing protocols have been proposed in recent years for possible deployment of
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …

Securing ad hoc networks

L Zhou, ZJ Haas - IEEE network, 1999 - ieeexplore.ieee.org
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional
mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead …

VeRA-version number and rank authentication in RPL

A Dvir, L Buttyan - … international conference on mobile ad-hoc …, 2011 - ieeexplore.ieee.org
Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of
thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 …

[KSIĄŻKA][B] The handbook of ad hoc wireless networks

M Ilyas, BC Seet, X Hannan, YC Tseng, A Mishra… - 2017 - taylorfrancis.com
A relative newcomer to the field of wireless communications, ad hoc networking is growing
quickly, both in its importance and its applications. With rapid advances in hardware …

[PDF][PDF] Wireless ad-hoc networks

L Han - Wireless Personal Communication Journal of mobile …, 2004 - cs.rutgers.edu
Abstract Deployed in 1990's, Mobile Ad-hoc networks have been widely researched for
many years. Mobile Ad-hoc Networks are a collection of two or more devices equipped with …

Physical access control

S Micali, D Engberg, P Libin, L Reyzin… - US Patent …, 2008 - Google Patents
Provisional application No. 60/370,867, filed on Apr. 8, 2002, provisional application No.
60/372,951, filed on Apr. 16, 2002, provisional application No. 60/373, 218, filed on Apr. 17 …

Security in wireless ad hoc networks

A Mishra, KM Nadkarni - The handbook of ad hoc wireless networks, 2003 - dl.acm.org
The realm of wireless ad hoc networks is a relatively new one, even with advancement in
wireless networks in general. Essentially, these are networks that do not have an underlying …

Efficient certificate revocation

S Micali - US Patent 7,337,315, 2008 - Google Patents
US7337315B2 - Efficient certificate revocation - Google Patents US7337315B2 - Efficient
certificate revocation - Google Patents Efficient certificate revocation Download PDF Info …

Highly secure and efficient routing

I Avramopoulos, H Kobayashi, R Wang… - IEEE INFOCOM …, 2004 - ieeexplore.ieee.org
In this paper, we consider the problem of routing in an adversarial environment, where a
sophisticated adversary has penetrated arbitrary parts of the routing infrastructure and …

Controlling access to an area

P Libin, S Micali, D Engberg - US Patent 7,822,989, 2010 - Google Patents
Controlling access includes providing a barrier to access that includes a controller that
selectively allows access, at least one administration entity generating credentials/proofs …